<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.smarthills.com.pg/blogs/cybersecurity/feed" rel="self" type="application/rss+xml"/><title>Smarthills Corporate Solutions Limited - Our Insights , Cybersecurity</title><description>Smarthills Corporate Solutions Limited - Our Insights , Cybersecurity</description><link>https://www.smarthills.com.pg/blogs/cybersecurity</link><lastBuildDate>Tue, 14 Apr 2026 10:04:34 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Best Practice for Account Security]]></title><link>https://www.smarthills.com.pg/blogs/post/Best-Practice-for-Account-Security</link><description><![CDATA[<img align="left" hspace="5" src="https://www.smarthills.com.pg/Untitled design-15-.png"/>In today's digital age, safeguarding your online accounts is more crucial than ever. By adopting best practices for account security, you can protect ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_eENeREaATvqHx3YCJU-zkA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_kEs1NtxATgOGfPbn-EZcdQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_P1zdCpfrQVuZNhAxHnHmbw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_7qYeg--fRGq-FDOBOqoz2A" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">Best Practice for Account Security</h2></div>
<div data-element-id="elm_K9tu3k3Q2bjJjvjHjWfzGg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_K9tu3k3Q2bjJjvjHjWfzGg"] .zpimage-container figure img { width: 500px ; height: 500.00px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-roundcorner zpimage-space-none " src="/Untitled%20design-15-.png" size="medium"/></picture></span></figure></div>
</div><div data-element-id="elm_CBRNPVwbT62jxSBwHbdqkg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-justify " data-editor="true"><p><span style="color:inherit;">In today's digital age, safeguarding your online accounts is more crucial than ever. By adopting best practices for account security, you can protect your personal information and ensure a safer digital experience. Refer below tips to enhance digital security and keep your account and data secure!</span></p></div>
</div><div data-element-id="elm_Ub62-IjZjPDGAn2hcs7d5w" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">Password</h2></div>
<div data-element-id="elm_p01HnOoarn3AM9BQlRie9A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-justify " data-editor="true"><p><span style="color:inherit;font-size:24px;">Always Use Strong Password</span></p></div>
</div><div data-element-id="elm_KT5L0H7BaOFv1tVO6GaztQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p><b>What is Strong Password? </b>A strong password is one that is difficult for others to guess or crack. Here are some key characteristics of a strong password:</p><p>&nbsp;</p><ul><li>Length: At least 12 characters long.</li><li>Complexity: Includes a mix of uppercase and lowercase letters, numbers, and special characters (e.g., !, @, #, $).</li><li>Unpredictability: Avoids common words, phrases, or easily guessable information like birthdays or names.</li><li>Uniqueness: Different from passwords used for other accounts.</li></ul><p>&nbsp;</p><p><b>Make passwords that are hard to guess but easy to remember.</b></p><ul><li>To make passwords easier to remember, use multiple phrases that are not your names or related to you. For example, “breadandbutteryum” or “FoamGreenpaper”. </li><li>Avoid single words, or a word preceded or followed by a single number (e.g. Password1). Hackers will use dictionaries of words and commonly used passwords to guess your password.</li><li>Don’t use information in your password that others might know about you or that’s in your social media (e.g. birthdays, children’s or pet’s names, car model, etc.). Bad actors often deploy social engineering techniques to research and gather information about their targets.</li></ul><div><br/></div>
<p><b>Complexity still counts.</b>&nbsp;To increase complexity, include upper and lower case letters, numbers, and special characters. A password should use at least 3 of these choices. To make the previous example more secure: “Bread &amp; butter YUM!” or “Fo@mgrEEnpaper99”</p><div style="color:inherit;"><p><span style="color:inherit;"><span style="font-size:12pt;"><br/></span></span></p><p><span style="color:inherit;"><span style="font-size:12pt;">However, don't make the password overly complex;&nbsp;make sure it is easily&nbsp;remembered.</span></span></p><p><span style="color:inherit;"><span style="font-size:12pt;"><br/></span></span></p></div></div></div>
</div><div data-element-id="elm_CgKicaNp6HzPC5wQZ3z-iQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-justify " data-editor="true"><p><span style="color:inherit;font-size:24px;">Don't reveal your Password to Anyone</span></p></div>
</div><div data-element-id="elm_A4jn3HiKxSMZFLlmRCvdQQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p>Never share or disclose your password to your family, friends or colleagues. Nobody needs to know them but you—not even the IT department. If someone is asking for your password, it’s always a scam.</p><p><br/></p></div></div></div>
</div><div data-element-id="elm_Vq2O_uh85U79KfFZUqWztg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-justify " data-editor="true"><p><span style="font-size:24px;">Use different Passwords on different Accounts</span></p></div>
</div><div data-element-id="elm_AhdTIpm7_NjZjcxv5MhTrw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p><b>Use different passwords for different accounts or websites.</b>&nbsp;That way, if one account is compromised, at least the others won’t be at risk. Always use Unique Password for your Online Banking Account and Email Account and do not use this password for any other account or websites.</p><p><br/></p></div></div></div></div>
</div><div data-element-id="elm_ejitn5ASkJJwKY9LUNpzyw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-justify " data-editor="true"><p><span style="font-size:24px;">Keep your Password Safe</span></p></div>
</div><div data-element-id="elm_aq1Q4leDCmKHysv54lh6Sw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p><span style="color:inherit;">Do not write your passwords on paper or in notepads. Keep your password in a safe location if you really need to write it down.</span></p><p><br/></p></div></div></div></div>
</div><div data-element-id="elm_qOrmY3N_4KWQ9OWD51L0TA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">2FA/MFA Authentication</h2></div>
<div data-element-id="elm_FHoUA22r92o3OqxIUxla3w" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-justify " data-editor="true"><p><span style="font-size:24px;">Set up 2FA or MFA method</span></p></div>
</div><div data-element-id="elm_ovEcQjhGGF3Ugx_XMnCszQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p><span style="color:inherit;"><b><span style="font-size:12pt;">Use multi-factor authentication (MFA).</span></b><span style="font-size:12pt;">&nbsp;Even the best passwords have limits. Multi-Factor Authentication adds another layer of protection in addition to your username and password. Generally, the additional factor is a token or a mobile phone app that you would use to confirm that you really are trying to log in.&nbsp;</span></span></p><p><span style="color:inherit;"><span style="font-size:12pt;"><br/></span></span></p></div></div></div></div>
</div><div data-element-id="elm_iq2fba8K-aKTCVmvdUwgjA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">Public/Shared Devices or Networks</h2></div>
<div data-element-id="elm_csVL2rVSAd0MhLjMMbpXIg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-justify " data-editor="true"><p><span style="font-size:24px;">Public/Shared Devices</span></p></div>
</div><div data-element-id="elm_4zsxx3Dc5JguKG1QaT_zqw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-size:16px;">When using public or shared devices, it's essential to take extra precautions to protect your account security. Here are some best practices to keep in mind:</span></p><ol><li style="margin-left:16px;">Avoid Logging into Sensitive Accounts: If possible, avoid accessing sensitive accounts such as banking or email on public devices.</li><li style="margin-left:16px;">Use Private Browsing Mode: Enable private or incognito mode to prevent the browser from saving your history, cookies, and other data.</li><li style="margin-left:16px;">Log Out Completely: Always log out of your accounts and close the browser window when you're done.</li><li style="margin-left:16px;">Don't Save Passwords: Never save passwords or allow the browser to remember your login details on public devices.</li><li style="margin-left:16px;">Be Wary of Keyloggers: Public devices can be compromised with keyloggers. Use virtual keyboards or password managers with auto-fill features to minimize the risk.</li><li style="margin-left:16px;">Clear Browsing Data: Clear the browser's cache, cookies, and history after your session.</li></ol></div></div></div></div></div>
</div><div data-element-id="elm_WB9YKYHB0m6sDms44UK4MQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-justify " data-editor="true"><p><span style="font-size:24px;">Public Networks</span></p></div>
</div><div data-element-id="elm_MjjAToQNjeu3ys4DDtXnbg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-size:16px;">Using public networks/WIFI can expose your accounts to various security risks. Here are some best practices to help protect your account security:</span></p><ol><li style="margin-left:16px;">Use a VPN: A Virtual Private Network (VPN) encrypts your internet connection, making it harder for attackers to intercept your data.</li><li style="margin-left:16px;">Avoid Accessing Sensitive Information: Try not to log into sensitive accounts, such as banking or email, when on a public network.</li><li style="margin-left:16px;">Enable Two-Factor Authentication (2FA): This adds an extra layer of security by requiring a second form of verification.</li><li style="margin-left:16px;">Verify Network Authenticity: Ensure you are connecting to a legitimate network. Avoid networks with generic names like &quot;Free Wi-Fi.&quot;</li><li style="margin-left:16px;">Keep Software Updated: Ensure your device's operating system, browser, and security software are up to date to protect against vulnerabilities.</li><li style="margin-left:16px;">Use HTTPS Websites: Look for &quot;https://&quot; in the URL, indicating that the website uses encryption to protect your data.</li></ol><div><br/></div></div></div></div></div></div></div>
</div><div data-element-id="elm_6Xzst4OWth3H2ClixwA_uQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">Phishing Emails</h2></div>
<div data-element-id="elm_ciV1mZAdX0X6M5oTHVPXRQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-justify " data-editor="true"><p><span style="font-size:24px;">Be aware and careful of Phishing attempts</span></p></div>
</div><div data-element-id="elm_dsiHECIKR65l82vS2Ubx4w" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:12pt;">Phishing is a method attackers employ to gain access to your personal information, your credentials, or to your account in general. An attacker will send phishing emails to a large number of recipients, hoping that some of the recipients will be deceived. The phishing email may cite a critical emergency and urge you to provide your personal information, or&nbsp;ask you&nbsp;to&nbsp;access a link to a malicious web&nbsp;page, or download a malicious attachment.</span><br/></div><div><br/></div><div><span style="font-size:12pt;">Even if you&nbsp;have&nbsp;secured your account with multi-factor authentication, the attacker can&nbsp;gain access to your account&nbsp;through these phishing web&nbsp;pages using sophisticated techniques.&nbsp;For example,&nbsp;using the&nbsp;&quot;Adversary-in-the-middle&quot;&nbsp;method, the attacker can steal the session cookies from your browser and gain access to your account bypassing MFA.</span></div></div><div><br/></div></div></div></div></div></div></div>
</div><div data-element-id="elm_GHJ6tmGsK2ZiqNdjOwIHhA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-justify " data-editor="true"><p><span style="font-size:24px;">How to identify a Phishing Emails</span></p></div>
</div><div data-element-id="elm_SJVn-lDiwXbePzMbJ3cqeQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="font-size:14px;"><p><span style="font-size:16px;">Identifying phishing emails can help you avoid falling victim to scams. Here are some key signs to look out for:</span></p><ol><li><strong><span style="font-size:16px;">Suspicious Sender</span></strong><span style="font-size:16px;">: Check the sender's email address. Phishing emails often come from addresses that look similar to legitimate ones but have slight variations.</span></li><li><strong><span style="font-size:16px;">Generic Greetings</span></strong><span style="font-size:16px;">: Be wary of emails that use generic greetings like &quot;Dear Customer&quot; instead of your name.</span></li><li><strong><span style="font-size:16px;">Urgent or Threatening Language</span></strong><span style="font-size:16px;">: Phishing emails often create a sense of urgency or fear, urging you to act quickly to avoid negative consequences.</span></li><li><strong><span style="font-size:16px;">Unusual Requests</span></strong><span style="font-size:16px;">: Legitimate companies will never ask for sensitive information like passwords, Social Security numbers, or credit card details via email.</span></li><li><strong><span style="font-size:16px;">Poor Grammar and Spelling</span></strong><span style="font-size:16px;">: Many phishing emails contain noticeable spelling and grammatical errors.</span></li><li><strong><span style="font-size:16px;">Suspicious Links or Attachments</span></strong><span style="font-size:16px;">: Hover over links to see the actual URL before clicking. Be cautious of unexpected attachments, especially if they have unusual file types.</span></li><li><strong><span style="font-size:16px;">Too Good to Be True Offers</span></strong><span style="font-size:16px;">: Be skeptical of emails offering large sums of money, prizes, or other rewards that seem too good to be true.</span></li><li><strong><span style="font-size:16px;">Mismatched URLs</span></strong><span style="font-size:16px;">: Ensure that the URL in the email matches the website it claims to be from. Phishing emails often use URLs that look similar but are slightly different.</span></li></ol><p><br/></p></div></div></div></div><div><br/></div></div></div></div></div></div></div>
</div><div data-element-id="elm_gnSVeqj8yC3LOVGrnxrnwQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">Ending</h2></div>
<div data-element-id="elm_kQiaPQsBAnGEX2PaseJxUA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="color:inherit;">For business and corporate user, it is important to deploy and&nbsp;</span><span style="font-size:14px;color:inherit;"><span style="font-size:16px;">implement robust cybersecurity protection systems like Trend Micro Worry-Free Business Security System and utilizing business-grade software such as Microsoft 365 and Google Workspace which comes with Advanced Protection Features. These tools provide comprehensive protection against threats, ensure data integrity, and facilitate secure collaboration.&nbsp;</span></span><span style="color:inherit;">Let's take proactive steps to safeguard our digital assets and create a secure working environment for everyone.&nbsp;</span></div><div><span style="color:inherit;"><br/></span></div><div><div style="color:inherit;">Learn more about Google Workspace.<br/></div></div>
</div></div></div></div></div></div></div></div><div data-element-id="elm_kGrdlZbIPbnud4QlMjSzIA" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="/google-workspace"><span class="zpbutton-content">Learn more</span></a></div>
</div><div data-element-id="elm_ELGLliVsHobR1NJRs-ChUg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="color:inherit;"></span><br/></div><div><span style="color:inherit;"><br/></span></div><div><div style="color:inherit;"><div align="left" style="font-size:12px;"><span style="font-size:16px;">We are Authorized Reseller and Partner for&nbsp;<b>Cisco, Google, Microsoft, Trend Micro</b>&nbsp;and many more.</span></div><div align="left" style="font-size:12px;"><span style="font-size:16px;"><br/></span></div><div align="left" style="font-size:12px;"><span style="font-size:16px;">Get in touch with us now.</span></div></div></div>
</div></div></div></div></div></div></div></div><div data-element-id="elm_2m64d1WORzit2BAu2Tr9uQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="/contact-us"><span class="zpbutton-content">Contact Us</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 04 Apr 2022 11:04:00 +1000</pubDate></item></channel></rss>